Our Blog

Read our latest blog posts

Digital Brand Protection: A Game-changing Strategy for Online Brand Reputation

Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection...

Continue reading

Helm: Paving the Way to Environment Aware Deployments

Creating and managing multiple deployments and sets of config. files can be a cumbersome task. But with...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

How to Progressively Migrate to Redux Toolkit

Redux toolkit works with fewer lines of boilerplate codes, simplified code logic, and it boosts performance. How...

Continue reading

A Guide to the Most Popular Zero-Day Attacks

Zero-days are software vulnerabilities that are not known to the developers. Here's a list of the most...

Continue reading

Defining the Role of a Product Manager in Startups

Defining and explaining the role of a product manager in startups by introducing the 4 Ps of...

Continue reading

Juspay Databases Containing 10 Crore Users’ Data for Sale on Data...

CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has...

Continue reading

Grappling with COVID-Themed Cyber Attacks: Pharmaceutical Sector

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the...

Continue reading

Analysing Third-Party App Stores for Modded APKs Through Signature Verification

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading